The aim of this study is to get practical evidence from the Egyptian business environment The Impact of Audit Committees Effectiveness and External Audit Quality on Timeliness of annual Financial Report. Design and methodology: The study based on the content analysis technique to examine the annual reports of a sample of (30) companies listed on the Egyptian Stock Exchange (EGX100) during the period (2016-2019) with a total of (120) respondents. To test the research hypotheses, the results of the study indicate that there is a negative significant impact of audit committees on timeliness of annual financial report. Moreover, while there is a negative impact on the quality of the external audit on the timing of issuing the annual financial report. There is a negative significant impact of audit committees and external audit quality on timeliness of annual financial report. Based on the previous results, the study recommends the necessity of directing attention and developing the awareness of the Managements of Egyptian joint stock companies to take all appropriate procedures, which guaranty avoidance, or limiting the delay in issuing the financial report. By doing these we can achieve fairness and transparency and protect the investor from the risks that he might be exposed to as a result of not publishing the financial reports on time. Practical evidence: The results of the study may be of interest to investors and companies when they determine the factors affecting the timing of issuance of financial reports for business establishments in the Egyptian environment. The results may also provide information that may be useful to the auditing authorities and the financial auditing authority on the motives of business establishments for delaying the issuance of annual financial reports.
This research deals with the rhetoric purposes of the passive voice in the holy Quran. First, we put an introductory to the concept of the Quran language and its difference of the spoken Arabic language during the revelation period. Besides; we gave a brief about the structure passive voice form of Arabic language. Second, we explained the purposes of passive voice used in the holly Quran with sufficient examples, commentaries and clarifications about all the cases. Rhetoric purposes that we deals with are: concision, emphasize an idea, avoid using the subject because it is known and clear for all or because it is really unknown, etc. This part has contained the most important purposes for the use of passive voice in holy Quran. At the end
... Show MorePalm vein recognition is a one of the most efficient biometric technologies, each individual can be identified through its veins unique characteristics, palm vein acquisition techniques is either contact based or contactless based, as the individual's hand contact or not the peg of the palm imaging device, the needs a contactless palm vein system in modern applications rise tow problems, the pose variations (rotation, scaling and translation transformations) since the imaging device cannot aligned correctly with the surface of the palm, and a delay of matching process especially for large systems, trying to solve these problems. This paper proposed a pose invariant identification system for contactless palm vein which include three main
... Show MoreIn this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.
The corrosion behavior of 2024 aluminium alloy was investigated in alkaline medium (pH=13) containing 0.6 . in absence and presence of different concentrations of three amino acids separately [Methionine, Glutamice acid and Lysine] as environmentally friendly corrosion inhibitors over the temperature range (293-308)K. Electrochemical polarization method using potentiostatic technique was employed. The inhibition efficiency increased with an increase of the inhibitor concentration but decreased with increase in temperature . The maximum efficiency value was found with lysine =80.4 of 293 k and 10 . concentration of lysine. The adsorption of the amino acids was found to obey Langmuir adsorption isotherm . Some thermodynamic parameter âˆ
... Show MoreBackground: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti
This book includes four main chapters: 1. Indefinite Integral. 2. Methods of Integration. 3. Definite Integral. 4. Multiple Integral. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.
Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreThis book includes three main chapters: 1. Functions & Their Derivatives. 2. Minimum, Maximum and Inflection points. 3. Partial Derivative. In addition to many examples and exercises for the purpose of acquiring the student's ability to think correctly in solving mathematical questions.
Teen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show MoreThis paper deals with a new Henstock-Kurzweil integral in Banach Space with Bilinear triple n-tuple and integrator function Ψ which depends on multiple points in partition. Finally, exhibit standard results of Generalized Henstock - Kurzweil integral in the theory of integration.